Free Google Associate Cloud Engineer Exam Braindumps (page: 21)

Page 20 of 74

You need to provide a cost estimate for a Kubernetes cluster using the GCP pricing calculator for Kubernetes. Your workload requires high IOPs, and you will also be using disk snapshots. You start by entering the number of nodes, average hours, and average days.
What should you do next?

  1. Fill in local SSD. Fill in persistent disk storage and snapshot storage.
  2. Fill in local SSD. Add estimated cost for cluster management.
  3. Select Add GPUs. Fill in persistent disk storage and snapshot storage.
  4. Select Add GPUs. Add estimated cost for cluster management.

Answer(s): A

Explanation:

https://cloud.google.com/compute/docs/disks/local-ssd



You are using Google Kubernetes Engine with autoscaling enabled to host a new application. You want to expose this new application to the public, using HTTPS on a public IP address.
What should you do?

  1. Create a Kubernetes Service of type NodePort for your application, and a Kubernetes Ingress to expose this Service via a Cloud Load Balancer.
  2. Create a Kubernetes Service of type ClusterIP for your application. Configure the public DNS name of your application using the IP of this Service.
  3. Create a Kubernetes Service of type NodePort to expose the application on port 443 of each node of the Kubernetes cluster. Configure the public DNS name of your application with the IP of every node of the cluster to achieve load-balancing.
  4. Create a HAProxy pod in the cluster to load-balance the traffic to all the pods of the application.
    Forward the public traffic to HAProxy with an iptable rule. Configure the DNS name of your application using the public IP of the node HAProxy is running on.

Answer(s): A


Reference:

https://cloud.google.com/kubernetes-engine/docs/tutorials/http-balancer Create a Kubernetes Service of type ClusterIP for your application. Configure the public DNS name of your application using the IP of this Service. is not right. Kubernetes Service of type ClusterIP exposes the Service on a cluster-internal IP. Choosing this value makes the Service only reachable from within the cluster so you can not route external traffic to this

IP.

Ref: https://kubernetes.io/docs/concepts/services-networking/service/



You need to enable traffic between multiple groups of Compute Engine instances that are currently running two different GCP projects. Each group of Compute Engine instances is running in its own VPC. What should you do?

  1. Verify that both projects are in a GCP Organization. Create a new VPC and add all instances.
  2. Verify that both projects are in a GCP Organization. Share the VPC from one project and request that the Compute Engine instances in the other project use this shared VPC.
  3. Verify that you are the Project Administrator of both projects. Create two new VPCs and add all instances.
  4. Verify that you are the Project Administrator of both projects. Create a new VPC and add all instances.

Answer(s): B

Explanation:

Shared VPC allows an organization to connect resources from multiple projects to a common Virtual Private Cloud (VPC) network, so that they can communicate with each other securely and efficiently using internal IPs from that network.
When you use Shared VPC, you designate a project as a host project and attach one or more other service projects to it. The VPC networks in the host project are called Shared VPC networks. Eligible resources from service projects can use subnets in the Shared VPC network https://cloud.google.com/vpc/docs/shared-vpc

"For example, an existing instance in a service project cannot be reconfigured to use a Shared VPC

network, but a new instance can be created to use available subnets in a Shared VPC network."



You want to add a new auditor to a Google Cloud Platform project. The auditor should be allowed to read, but not modify, all project items.

How should you configure the auditor's permissions?

  1. Create a custom role with view-only project permissions. Add the user's account to the custom role.
  2. Create a custom role with view-only service permissions. Add the user's account to the custom role.
  3. Select the built-in IAM project Viewer role. Add the user's account to this role.
  4. Select the built-in IAM service Viewer role. Add the user's account to this role.

Answer(s): C


Reference:

https://cloud.google.com/resource-manager/docs/access-control-proj

The primitive role roles/viewer provides read access to all resources in the project. The permissions in this role are limited to Get and list access for all resources. As we have an out of the box role that exactly fits our requirement, we should use this.

Ref: https://cloud.google.com/resource-manager/docs/access-control-proj

It is advisable to use the existing GCP provided roles over creating custom roles with similar permissions as this becomes a maintenance overhead. If GCP modifies how permissions are handled or adds/removes permissions, the default GCP provided roles are automatically updated by Google whereas if they were custom roles, the responsibility is with us and this adds to the operational overhead and needs to be avoided.






Post your Comments and Discuss Google Google Associate Cloud Engineer exam with other Community members:

Google Associate Cloud Engineer Discussions & Posts